Apple Certifications

Is Your IT Team Certified?

Certifications are available for most Apple technologies and skill levels from business workers to IT professionals, developers, technology trainers, and system architects.

Performance Under Pressure

Is Your Jamf Pro Server Ready?

Has your Jamf Pro server gone though many different Jamf Pro Administrators? Do you have a complete understanding of exactly how your Jamf Pro sever is configured? Let HCS preform a health check on your Jamf Pro Server.

Essential Utilities for Apple IT Administrators

Managing Apple technology in an enterprise or educational environment requires the right tools to ensure efficiency, security, and seamless user experiences. Our suite of IT utilities is designed to simplify device deployment, streamline management, and enhance security for macOS and iOS devices.

Establish your first Mac deployment

HCS Technology Group will help you implement a proof of concept (POC) efficiently and aligned with best practices for easily deploying Mac in your organization.

Email may be the most common form of phishing, but it’s not the only one. Modern Web browsers support a technology that enables websites to display system-level notifications just like regular apps. These push notifications have good uses, such as letting frequently updated websites inform users of new headlines, changed discussion threads, and more.

Unfortunately, push notifications can be subverted for malicious purposes, notably phishing. Here’s what happens. You visit a website that asks you if you’d like to receive notifications.

That request may be introduced with language that implies you must agree in order to get desired content, or it may be a bald-faced request to show notifications. If you agree, the website will be able to display alarming or deceptive phishing notifications even when it’s not open.

The goal is to trick you into clicking the notification, which will load a fake site that attempts to get you to enter login credentials or credit card information to facilitate identity theft.

The danger of phishing notifications is that they come from the system, so they may seem more legitimate than email messages trying to sucker you into revealing personal information. Nevertheless, as you can see in the examples above, they may still look sketchy in ways reminiscent of phishing emails:

No legitimate website would use emoji or symbols in a notification, much less multiple ones. Although there are no glaring spelling or grammar mistakes, the use of all caps in the top notification is a giveaway. Similarly, standard notifications wouldn’t use exclamation points. The use of “Click here” is poor information design that’s unlikely to come from a professional programmer or Web designer.

Phishing notifications, although problematic, aren’t a malware infection, and anti-malware packages won’t detect or remove them. Luckily, they’re easy to control and block in Safari and other Web browsers.

Prevent Phishing Notifications

The easy way to ensure you don’t see phishing notifications is to allow only trusted websites to send notifications. In general, we recommend keeping that list small so you’re not frequently interrupted by unnecessary notifications.

If you’re unsure that you’ll be able to identify malicious websites, you can enable a browser setting that prohibits all websites from asking for permission to send notifications. In Safari, choose Safari > Settings > Websites > Notifications, and deselect “Allow websites to ask for permission to send notifications” at the bottom.

Other browsers have similar options, and most will look like Google Chrome, as shown below:

Arc: Choose Arc > Settings > General > Notifications and select “Don’t allow sites to send notifications.” Brave: Navigate to Brave > Settings > Privacy and Security > Site and Shield Settings > Notifications and select “Don’t allow sites to send notifications.” Firefox: Go to Firefox > Settings > Privacy & Security > Notifications and select “Block new requests asking to allow notifications.” Google Chrome: Navigate to Chrome > Settings > Privacy and Security > Site Settings > Notifications and select “Don’t allow sites to send notifications.” Microsoft Edge: Choose Microsoft Edge > Settings > Cookies and Site Permissions > Notifications and turn off “Ask before sending.”

Browsers based on Chrome (everything except Firefox in the list above) offer a “Use quieter messaging” option that replaces the permission dialog with a bell icon next to the site name in the address bar—click it to allow notifications from that site.

Eliminating Phishing Notifications

Now you know how to prevent new sites from requesting permission to display notifications. What about sites that already have permission? It’s easy to block them in Safari’s Notifications settings screen. If you have any undesirable sites with Allow in the pop-up menu to the right of their name in the Notifications screen, choose Deny from that menu. You could remove the site instead, but that would allow it to ask for permission again.

Firefox’s interface is similar to Safari’s, but Chrome-based browsers have a different interface that separates the blocked and allowed sites. To block a website whose notifications you no longer want to receive, click the button to the right and choose Block. Again, you could remove undesirable sites if you prefer, but remember that if your notification settings ever change, doing so could allow the site to ask for permission once more.

Ultimately, it’s easy to avoid phishing notifications by paying attention as you browse the Web. Steer clear of websites that make an unexpected request to display notifications. Notifications aren’t necessary on hardly any websites, so there’s no harm in denying such requests unless you’re sure they’re legitimate.

(Featured image based on an original by iStock.com/tadamichi)

Social Media: Did you know that a phishing website can send you a notification right on your Mac? Learn how this could happen and how to prevent it in your favorite Web browser.

Trusted by organizations worldwide
The American Red Cross
Bose
Morgan Stanley
Apple Computer
PepsiCo
Cigna
Barnes & Noble
Company

HCS Technology Group

Over 35 years of experience helping you achieve your service objectives with Apple devices and technology.

Innovative IT Solutions

Our capabilities and solutions include:

Strategy and Analytics
Technology Architecture
Engineering Services
Pre-emptive Maintenance
Break/Fix Support
Education
Large-Scale Deployments
Hosting
Managed Services

Partners

Mosyle

Mosyle

With Mosyle’s MSP program, HCS Tech Group offers MDM-related services to customers so HCS Tech Group can manage your endpoints and ensure your Apple devices are running smoothly. This will facilitate learning and how technology is used in your business, as well as lower your operational expenditure and time.

Jamf

Jamf

As a managed service provider, HCS Tech Group offers strategic value to a subset of the market by identifying, securing and managing your Jamf Pro needs. A partnership with Jamf means bridging the gap between us as a method to help even more organizations succeed with Apple.

Jamf Service Provider3 d61da94b

To help ensure customer success, all sales of Jamf Pro include new customer onboarding services. We understand organizations have different needs and experience. Therefore, we offer a variety of onboarding services with multiple delivery methods and levels of training. Jamf will work with you to determine which option is the most efficient and effective for you and your organization:

  • Our full-service, personalized onboarding offerings are delivered by a Jamf Pro expert at your location.
  • Jamf remote onboarding services provide personalized sessions by a Jamf Pro expert utilizing remote connection tools.
  • For qualified customers in the US and APAC, a self-directed, no-cost onboarding option is also available.

During the personalized Jamf onboarding sessions, a Jamf Pro expert works with you to configure and integrate Jamf Pro seamlessly into your existing environment. Through a hands-on approach, the trainer will familiarize you with Jamf Pro features and configurations, provide workflow recommendations, review support resources available, and introduce you to additional training and certification options. Jamf’s self-directed onboarding is provided through a series of pre-recorded training sessions, combined with interactive tutorials and support staff to assist if needed.

Services

IT Solutions For All Your Needs

Handling every aspect of your computer network, from needs assessment and planning to installation, administration and training.

Business

Whether your business system consists of a single workstation or a comprehensive, high-speed, multi-station network with servers, HCS can help.

Learn More
Business

Education

HCS Technology Group provides Apple Professional Services for educational institution for K -12 As well as higher education.

Learn More
Education

Consumer

We can help you move forward in the home as new technology emerges and will benefit you by bringing you increased productivity, efficiency, creativity, and fun.

Learn More
Consumer

Mobility

If you are considering the deployment of a large number of iPad, iPhone and/or iPod Touch devices, you want to work with experienced Mobile Technical Coordinators like those found at HCS Technology Group.

Learn More
Mobility
Support

Latest Technical Articles

Whether you are experienced or new to the Mac, our technical articles offers insightful solutions for your needs.

Offboard a Mac Computer Using Jamf Pro and Apple Business Manager

This guide outlines the steps to properly offboard a Mac computer from Jamf Pro when an...

Read More

How to Configure Jamf Pro SMTP with Google Authentication

Configure Jamf Pro to use Google Authentication for SMTP enhances security, ensures compliance,...

Read More

How to Configure Jamf Pro SMTP to Use the Microsoft Graph API

Configuring Jamf Pro to use the Microsoft Graph API for SMTP enhances security, ensures...

Read More

Retrieve AppleCare Expiration for Mac Computers Using Jamf Pro

This guide provides a practical solution by demonstrating how to utilize Jamf Pro’s API roles,...

Read More

Speak with an Apple Certified expert today

We’d love to discuss your business challenges, even if you’re not sure what your next step is. No pitch, no strings attached.

Let's Talk